General

  • Target

    6e7614af4ddfa286ca963c3f4c039c2a

  • Size

    5.0MB

  • Sample

    220720-dn241abca6

  • MD5

    6e7614af4ddfa286ca963c3f4c039c2a

  • SHA1

    4086d509392b10e43af87a782e5d96acc5cfff9f

  • SHA256

    552249b242e9857e66ca1c2b55e55ecaa354017e1f1fcd2c7ba60388eba99ac5

  • SHA512

    ebc8fb369c6fc33a20520b493c1e0ca03ba2b9c1f8d398e6f576424fb1028c66f7cebadd22fe67e750e9d44041ae9133e42188b88c479dafca5f1f693c6abc97

Malware Config

Targets

    • Target

      6e7614af4ddfa286ca963c3f4c039c2a

    • Size

      5.0MB

    • MD5

      6e7614af4ddfa286ca963c3f4c039c2a

    • SHA1

      4086d509392b10e43af87a782e5d96acc5cfff9f

    • SHA256

      552249b242e9857e66ca1c2b55e55ecaa354017e1f1fcd2c7ba60388eba99ac5

    • SHA512

      ebc8fb369c6fc33a20520b493c1e0ca03ba2b9c1f8d398e6f576424fb1028c66f7cebadd22fe67e750e9d44041ae9133e42188b88c479dafca5f1f693c6abc97

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3288) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1260) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks